A

  • Active S-box 4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]

  • ASIC Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers [Volume 15, Issue 1, 2023, Pages 137-151]

  • Attribute-Based Encryption Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]

B

  • Blockchain Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]

C

  • Cloud Computing Latest Threats Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]

  • Cloud Computing Security Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]

  • Cloud Computing Threats Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]

  • Cloud Security Countermeasures Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]

  • Cloud Security State-of-the-Art Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]

  • Cloud Security Taxonomy Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]

  • Constant Number of Pairings Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]

D

  • Diffusion layer 4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]

  • Dynamic analysis A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]

E

  • Ethereum Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]

  • Evasion methods A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]

H

  • Hierarchical Deterministic Wallets Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]

  • Hierarchical Threshold Access Structure A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]

  • High-throughput Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers [Volume 15, Issue 1, 2023, Pages 137-151]

I

  • Internet of Things Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]

M

  • Machine Learning A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]

  • MDS matrix 4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]

  • Modes of Operation Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

  • Multi-Secret Sharing A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]

  • Multi-Stage Secret Sharing A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]

O

  • Outsourced Decryption Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]

P

  • Payload methods A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]

Q

  • Quantum Cryptanalysis Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

  • Quantum Distinguishers Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

  • Quantum Key Recovery Attack Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

  • Quantum Related Key Attack Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

  • Quantum Slide Attack Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

R

  • Revocation Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]

S

  • Sensitive methods A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]

  • Social Secret Sharing A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]

  • Steganography Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]

  • Substitution box (S-box) Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers [Volume 15, Issue 1, 2023, Pages 137-151]

  • Symmetric Cipher Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

T

  • Transaction Address Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]